Hacker Movies
Famous Hacks
Linux
Network
Security
100

In this 1998 thriller, Will Smith's character becomes the target of a government conspiracy after unknowingly obtaining incriminating evidence on a U.S. official, with the help of a reclusive ex-NSA operative

What is Enemy of the State?

100

This cyber attack targeted Iranian nuclear facilities in 2010 using a highly sophisticated worm that infected industrial control systems, specifically aimed at sabotaging uranium centrifuges

What is Stuxnet?

100

This command is used to create a new directory in Linux

What is mkdir?

100

This well known service usually is on Port 443

What is https?

100

This identity and access management security method requires two forms of identification to access resources and data

What is MFA/2FA?

200

This 1983 film features a young hacker who accidentally accesses a U.S. military supercomputer and almost starts World War III by playing what he believes is a video game

What is WarGames?

200

Hackers were able to get into this big-name company’s credit card information through their HVAC system

What is Target?

200

On Debian based Linux Distros, this command is used to install new packages

What is apt or apt-get?

200

This model consists of 7 layers and describes the communication of computer systems on a network

What is the OSI model?

200

This type of phishing targets specific individuals within an organization using personal details to make the attack more convincing, often bypassing generic spam filters.

What is Spear Phishing?

300

This cryptographer and mathematician cracked the German Enigma code during World War II

Who is Alan Turing?

300

This notorious hacker and author of the book “Ghost in the Wires”, is known for breaking into government and corporate systems

Who is Kevin Mitnick?

300

This Linux command-line utility is used for searching plaintext datasets for lines that match a regular expression

What is grep?

300

This device connects multiple network components such as computers, printers, & servers, and forwards data packets directly between them utilizing MAC addresses

What is a Switch?

300

A 3-way handshake uses this type of encryption

What is Asymmetric encryption?

400

The tool used by Trinity in The Matrix to make it seem like she is hacking

What is nmap?

400

In 2014, this entertainment company was hacked by a group called the "Guardians of Peace," allegedly in retaliation for releasing a controversial film, leading to massive leaks of internal emails and unreleased films

What is Sony or Sony Pictures?

400

This symbol represents the current user’s home directory in a Linux shell

What is ~ (tilde)?

400

This system is designed to detect and respond to potential security breaches within a network



What is an intrusion prevention system (IPS)?

400

This framework is commonly used to describe the behavior, tactics, techniques, and procedures of cyber adversaries

What is the MITRE ATT&CK Framework?

500

This hacking collective, famous for public cyber attacks against entities they view as corrupt, initiated "Operation Payback," targeting financial institutions in support of WikiLeaks after it was cut off from donations

What is anonymous?

500

In 2016, while in the middle of a significant acquisition, this tech giant acknowledged suffering multiple massive data breaches…the first of which took place three years prior.  3.5 billion user accounts we compromised

What is Yahoo?

500

This command-line utility allows users to schedule jobs to run at specific times, dates, or intervals on Unix-like operating systems. Because of the complexity of the syntax used, it can be easily misconfigured

What is cron?

500

This subnet mask “0/24” translates to this subnet

What is 255.255.255.0?

500

On a scale of 1-10 in the looks department, you're a 5 at best. While attending a conference in Hong Kong, you're getting unusual attention from a 10 at the conference hotel bar. You're probably an unwitting victim of this type of operation

What is a Honeypot?